General Security Concepts

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/61

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

What are the four categories of Security Controls

Technical, Managerial, Operational, Pysical

2
New cards

List the different types of security Controls

Preventative, Deterrent, Detective, Corrective, Compensating, Directive

3
New cards

What are the three core principles of the CIA triad

Confidentiality, Integrity, and Availability

4
New cards

Confidentiality

To prevent unauthorized access to information and data.

5
New cards

Integrity

Ensuring info is not altered by unauthorized entities 

6
New cards

Availability

Authorized users have reliable and timely access to resources 

7
New cards

What does AAA stand for in cybersecurity?

Authentication, Authorization and Accounting

8
New cards

Authentication

Proves who you are

9
New cards

Authorization

Decides what you’re allowed to do

10
New cards

Accounting

Records what you do

11
New cards

Zero Trust

Organization should not automatically trust anything inside or outside its perimeters and verify everything connecting to systems

12
New cards

What is network segmentation?

Dividing a network into smaller parts to improve security and performance.

13
New cards

OSI Model

A 7-layer framework that explains how data moves through a network

14
New cards

Please Do Not Throw Sausage Pizza Away

Application – User interface (web, email) (Layer 7)

Presentation – Formats/encrypts data

Session – Manages connections

Transport – Breaks data into segments (TCP/UDP)

Network – Routes data (IP addresses)

Data Link – Moves frames (MAC addresses)

Physical – Wires, signals, hardware. (Layer 1)

15
New cards

Honeypots

Are decoy systems designed to attract attackers

16
New cards

Honeyfies

Decoy files used to lore attackers. Appear valuable.

17
New cards

Difference between full disk and file level encryption

Full-disk encryption encrypts the entire drive, including the OS and all files, protecting everything if the device is lost or stolen.
File-level encryption only encrypts specific files or folders, offering selective protection for sensitive data.

18
New cards

Difference between Database and Partition encryption

Database Encryption: Protects data inside a database (tables, records).
Keeps stored info safe even if the database file is stolen.
(Example: Transparent Data Encryption – TDE)Partition Partition Encryption: Encrypts an entire section of a drive (partition).
Protects all data types in that partition, not just database files.

19
New cards

What is Hardware Security Module (HSM)

device that stores and manages encryption keys. It performs cryptographic operations like encryption, decryption, and digital signing

20
New cards

What is a Trusted Platform Module (TPM)

A special security chip on the motherboard that stores encryption keys and protects system integrity. Helps with BitLocker and secure boot

21
New cards

Gap Analysis

A method to find the difference between the current state and the desired goal.

22
New cards

Gap analysis in security planning?

aids in security planning by finding weaknessess, and areas needing help.

23
New cards

What does a switch do?

Connects multiple devices on the same local network and forwards data only to the device that needs it (using MAC addresses).

24
New cards

What does a router do?

Connects different networks together and directs data between them using IP addresses.

25
New cards

What is a server?

A powerful computer that provides resources or services (like files, websites, or email) to other devices (clients) on a network.

26
New cards

What is a network?

group of connected devices (like computers, servers, and routers) that share data and resources.

27
New cards

What is a LAN?

A network that connects devices in a small area like a home, school, or office.

28
New cards

What is a WAN?

A network that connects multiple LANs over large distances — like between cities or countries. (Internet)

29
New cards

What is RADIUS? (Remote Authentication Dial-In User Service)

is a protocol that authenticates, authorizes, and accounts users trying to access a network.

30
New cards

Protocol

set of rules that devices use to communicate and exchange data over a network.

31
New cards

Bollards

used to prevent vehicle access to certain areas

32
New cards

What is Access control vestibule, or mantrap

small, enclosed space with two sets of interlocking doors that acts as a secure entryway. Outer doors must be closed before inner doors can open.

33
New cards

What does video surveillance do in physical security 

deters criminal activity and montiers premises.

34
New cards

What is non-repudiation

provides proof that a person cannot deny having performed an action, such as sending a message or signing a document. Achieved though use of digital signature

35
New cards
36
New cards
37
New cards

Digital Signature

cryptographic way to verify who sent a message and that it hasn’t been changed.
Created with a private key, checked with a public key.

38
New cards

PKI (Public Key Infrastructure)

framework that creates, manages, and validates digital certificates and public/private keys to secure communications.

39
New cards

What is symmetric encryption?

Same key used to encrypt and decrypt. Fast, good for bulk data. (Example: AES)

40
New cards

What is asymmetric encryption?

Uses public + private key pair. Public key encrypts, private key decrypts. Good for key exchange and signatures. (Example: RSA, ECC)

41
New cards

What is obfuscation?

Deliberately making code/data hard to read to hide logic or deter reverse-engineering. Not true encryption.

42
New cards

What is steganography?

Hiding a message inside another file (image, audio) so its existence is concealed.

43
New cards

What is cryptography?

Science of securing information using algorithms for confidentiality, integrity, authenticity, and non-repudiation.

44
New cards

Allow List (whitelist)

only explicitly permitted items

45
New cards

Deny list (blacklist)

block specific items but allow the rest.

46
New cards

What is SIEM? (Security Information and Event Management)

collects, analyzes, and correlates logs/events to detect, alert on, and investigate security incidents.

47
New cards

What is certificate pinning?

Binding a service (like google) to a specific certificate or public key so the client only accepts that exact certificate.

48
New cards

what is TLS (Transport Layer Security)

security protocol that makes websites use https:// instead of http://.

49
New cards

OCSP (Online Certificate Status Protocol)

a system that checks if a website’s certificate is still valid (hasn’t been revoked).

50
New cards

what is OCSP Stapling (or certificate stapling)

the server includes proof its certificate is still valid, saving time and protecting your privacy.

51
New cards

Hard Drive

physical storage device in a computer that stores the operating system, applications, and your files, like documents, photos, and music

52
New cards

RAID (Redundant Array of Independent Disks)

combine multiple hard drives to act like one big system for speed, redundancy (backup), or both.It’s mainly used on servers to protect data and improve performance.

53
New cards

Block Cipher

Encrypts data in fixed-size chunks (blocks) usually 128 bits at a time. Example: AES

54
New cards

Stream Cipher:

Encrypts data one bit or byte at a time, like a steady stream. Example: RC4 (older, not used much now).

55
New cards

OSI Layer 7- Application Layer

User-level software and network services (HTTP, FTP, DNS, SMTP).

56
New cards

OSI Layer 6 - Presentation

Formats and encrypts data for the application layer. Handles translation, encryption, compression. (Example: SSL/TLS)

57
New cards

OSI Layer 5 - Session

Manages connections between devices (start, maintain, end).

58
New cards

OSI Layer 4 - Transport

Controls data delivery — reliability, flow, and error checking.

59
New cards

OSI Layer 3 - Network

Handles routing and IP addressing.

60
New cards

OSI Layer 2 - Data Link

Moves data between devices on the same network. Uses MAC addresses. Devices: Switches.

61
New cards

OSI Layer 1 - Physical

Transmits raw bits over cables, Wi-Fi, or fiber. Devices: Hubs, cables, NICs.

62
New cards

NIC (Network Interface Controller)

hardware component that connects a computer to a network, allowing it to send and receive data